{"title":"Exploiting Random Patterns of Optically Readable Materials to Ensure Authentication of Documents, Media & Substrates","authors":"J. Fraser","doi":"10.1109/THS.2008.4534492","DOIUrl":"https://doi.org/10.1109/THS.2008.4534492","url":null,"abstract":"Despite attempts of existing technologies, the problem of counterfeit products and documents persists. Advanced capabilities of counterfeiters have thwarted earlier attempts to solve the problem. Also, many existing solutions have either shown security flaws or require an infrastructure build-out. Tracer Detection Technology Corp. offers a theoretically foolproof confirmation of the authenticity of a document or article, even if the 'past-gen\" technologies have been compromised or are included in a tiered system. Exploiting random patterns of optically materials that are image processed and matched to a machine-readable code, Tracer's solution creates a non-duplicable digital fingerprint, enabling verification of the authenticity of the protected articles. Using wired or wireless readers, an article is authentic only if the code confirms the pattern and its optical characteristics. This system is in the final stages of development. A prototype system exists as the basis for the completion of a reproducible commercial reader expected to be market ready before end of 2008.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"358 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116551290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unified Incident Command and Decision Support (UICDS): A Department of Homeland Security Initiative in Information Sharing","authors":"J. Morentz","doi":"10.1109/THS.2008.4534471","DOIUrl":"https://doi.org/10.1109/THS.2008.4534471","url":null,"abstract":"Unified incident command and decision support is an initiative to architect, develop, and deploy a \"middleware\" foundation that enables ubiquitous information exchange among existing government and commercial incident management technologies for the purpose of creating role-based, incident-specific situational awareness and information sharing. This paper describes the architecture and pilot development that will lead to UICDS providing decision support on end-user digital devices that include standard computers, PDAs, and radios to individuals, teams, and organizations that engage in risk prevention, protection, response, and recovery. A case study of decision support enabled by UICDS describes how geospatial predictive analytics utilizes UICDS information sources to anticipate potential natural, technological, and terrorist events and effectively allocate resources to counter them.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131270367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review of Human Signatures in Urban Environments Using Seismic and Acoustic Methods","authors":"J. Sabatier, A. Ekimov","doi":"10.1109/THS.2008.4534452","DOIUrl":"https://doi.org/10.1109/THS.2008.4534452","url":null,"abstract":"Techniques for sensing footstep vibrational frequencies, typically below 100 Hz, by seismic sensors are well- developed human detection methods. Walking styles (standard, soft, or stealthy) and the background noise floor limit the detection range of footsteps. Walking style changes the dynamic footstep force on the ground and the influences the footstep detection range. The seismic background noise floor is much higher in urban areas and in buildings than in rural areas, dramatically influencing detection range. Alternatively, high- frequency passive and active ultrasonic methods for human detection are being developed. High-frequency sound produced by friction forces between a foot and the ground/floor allow passive footstep detection in urban areas and in buildings. The active method utilizes continuous-wave Doppler ultrasound. Simultaneously collecting Doppler motion and footstep ultrasonic signals reveals correlated timing features between the footstep friction and the Doppler shift from the human motion. Discrimination between human and other moving targets is accomplished by analyzing the envelopes of footstep signatures.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131275113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-Time Text and Language Independent Speaker Identification with a Reconfigurable Wireless Network of Acoustic Sensors","authors":"M. Bocca, H. Koivo","doi":"10.1109/THS.2008.4534491","DOIUrl":"https://doi.org/10.1109/THS.2008.4534491","url":null,"abstract":"This paper describes a reconfigurable wireless network of acoustic sensors that records voice signals in different areas of a building and conveys them at the sink node. At their arrival, a light-weight text and language independent algorithm performs the speaker identification task in real time. The end-user can interrupt the normal operation mode of the network and require a signal to a particular node, specifying also sampling frequency and time length of the sampling period. In our simulations, we use a database composed of 200 signals, 60 individuals, and 15 languages. The total execution time is less than 2 seconds. We optimize the parameters of the algorithm, achieving 83% accuracy. We also evaluate its robustness when the sampling frequency and the time length of the signals are reduced. Finally, the power consumption of the operating nodes is analyzed.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131621867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Second Life: Limits Of Creativity Or Cyber Threat?","authors":"S. Mandal, Ee-Peng Lim","doi":"10.1109/THS.2008.4534503","DOIUrl":"https://doi.org/10.1109/THS.2008.4534503","url":null,"abstract":"The paper explores the possibility of the spread of extremism and the potential threat of cyber terrorism in the fast growing virtual world of Second Life (SL). After introducing SL, the paper looks at the 'griefing' attacks in Second Life, which may be akin to terrorism in real life. It also analyses the potential use of SL for indoctrination, recruiting, rehearsing attacks, organisation and communication by extremist groups. The paper states that social interaction that mirror real life interactions in Second Life can provide opportunities for the sharing of socio-political ideas and even an avenue for organising political activities. There also exists the potential use of SL by extremist groups for enhanced and easier communication. Rehearsing attacks is improbable while some initial planning and reconnaissance for potential terrorist attacks can be carried out. However, the threat of money laundering in SL is credible. Today, the spread of extremism on the Internet and their potential foray into the virtual world is a credible threat that all stakeholders in the international community need to be aware of.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133267966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Use of ID Reader-Authenticators in Secure Access Control and Credentialing","authors":"T. Kuklinski, B. Monk","doi":"10.1109/THS.2008.4534458","DOIUrl":"https://doi.org/10.1109/THS.2008.4534458","url":null,"abstract":"Knowing who is entering, and whether they should be granted access, is key information for many types of military, government and commercial facilities. In many situations, access is granted based on an Identification Document (ID) such as a driver's license, passport, visa, or other specialized ID card. Although screeners are trained to detect false IDs, they have the daunting task of trying to do this within a few seconds for large numbers of people and types of documents on a daily basis. Newer cost effective ID Reader-Authenticators can add a high degree of automation and accuracy to the secure access control process. Available in a variety of physical configurations, they can automatically read IDs in full color at high resolution with multiple light sources, extracting image fields such as photos, as well as data fields, whether from text, barcodes, magnetic stripes, or embedded chips. The data extracted can be vetted against external watchlists without compromising privacy. They can process most currently issued IDs whether or not they contain machine readable enhancements. IDs can be authenticated via a wide variety of tests based on detecting embedded security features. Reader-Authenticators are particularly useful in the enrollment process (as part of new government ID initiatives) to avoid issuing IDs based on false breeder documents. Secure access control, whether at a national border, secure installation, lobby of a building, or airport screening area, can be enhanced with the use of today's advanced Reader-Authenticator technology.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133939429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CBRN Decontamination using a Large-Area Cold Plasma Applicator","authors":"G. Konesky","doi":"10.1109/THS.2008.4534509","DOIUrl":"https://doi.org/10.1109/THS.2008.4534509","url":null,"abstract":"The medical community has used cold plasma for several years. A cold plasma is an ionized gas in which only a small fraction of the gas molecules are ionized, and is formed by passing an inert gas, such as argon or helium, over a sharp conductive point that is held at high voltage and high frequency. An additional benefit in the medical application of this technology is enhanced wound healing due to the destruction of infectious microbial agents without damaging healthy tissue. By expanding the cold plasma applicator to an area of a square meter or more, a general purpose decontamination device results with uses in the destruction of biological and chemical agents, and in assisting in the removal of radiological agents, while causing minimal or no damage to the contaminated substrate material. This approach is especially useful on porous surfaces. The use of large-area low cost applicators, utilizing numerous simultaneous independent plasma emitters for CBRN decontamination applications is considered.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122410210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gamma Vector Camera: A Gamma Ray and Neutron Directional Detector","authors":"M. Hindi, L. Klynn, H. Demroff","doi":"10.1109/THS.2008.4534502","DOIUrl":"https://doi.org/10.1109/THS.2008.4534502","url":null,"abstract":"We have built a proof-of-concept gamma-ray camera capable of imaging the Compton recoil electron tracks in 3D, and reconstructing the gamma-ray source direction and energy spectrum from those tracks. The electrons are tracked in a fiber-optic scintillating block made from polystyrene fibers arranged in alternating, orthogonal layers, and viewed by image intensifiers and CCD cameras. We have also demonstrated the detection of neutrons in the same gamma camera by recording the scintillation light from proton recoils in the fibers, and discriminating between protons and electrons based on their different ranges in polystyrene. We have developed software that reconstructs the energy and direction of the recoil electrons and reconstructs the energy spectrum and direction of the gamma rays from (1) single Compton scattering, by computing the mean electron direction of a statistical sample, and (2) double and triple Compton scattering by full kinematic reconstruction of the energy and direction of individual gamma rays.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127701401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Device Independent Information Sharing During Incident Response","authors":"D. Goughnour, R. Durbin","doi":"10.1109/THS.2008.4534501","DOIUrl":"https://doi.org/10.1109/THS.2008.4534501","url":null,"abstract":"Information sharing during incident response is a critical component to success. Responders should be able to quickly connect to an information network to access information that is situation relevant using a variety of devices and software. In such an environment cell phones, PDAs, and wireless laptops should be able to connect and share information including locations and status of human and material resources as well as casualties. The following scenarios present the need to collect and process data from varied devices to provide alerts and visual reference when events of concern occur during incident response. 1. Incident response begins with the setup of mobile servers that begin data assimilation and sharing. Responders know through prearranged protocols how to connect with any communications device to announce their activities and locations. Assets such as water, food, medicine, and other supplies are tracked. Alerts are provided when assets deviate from planned routes and locations or are suspected missing. 2. Portable Web cams are deployed to monitor critical points with selected access to media. VIPs and press representatives are provided active GPS devices and are constantly tracked. Alerts are provided to responders if visitors enter areas where they might face danger or interfere with operations. 3. Relevant situational alerts are provided to responders when their proximity to the incident put them at risk. Whether encircling fire, rising water, or washed out roads and bridges spatially aware monitoring detects and alerts situations where rescuers and responders are at risk of being trapped in danger before it happens.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127871464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Drury, J. Arambula, S. Kuhn, M. Micire, H. Yanco
{"title":"Identifying Technology Gaps in Hazardous Materials Operations","authors":"J. Drury, J. Arambula, S. Kuhn, M. Micire, H. Yanco","doi":"10.1109/THS.2008.4534455","DOIUrl":"https://doi.org/10.1109/THS.2008.4534455","url":null,"abstract":"Our eventual goal is to design new decision support technologies to enhance understanding of fast-paced, uncertain hazardous materials (HAZMAT) response situations. Before developing improved technologies, we need to understand HAZMAT operations in practice as opposed to how it is presented in the manuals. To gain this understanding, we have been interviewing HAZMAT personnel and observing exercises. This paper presents an analysis of the communications that occurred among personnel, primarily in person or via radio, during three HAZMAT exercises (focusing on one day-long exercise in particular). This analysis allowed us to pinpoint problem areas that could potentially be addressed by decision support technologies. We provide our assessment of technology approaches that could aid the more serious problems we saw in our analysis.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114515680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}